Is this file safe to uninstall?

Posted on 2006-06-03
Last Modified: 2013-12-04

I have a client with an infected file. The file is eied_s7_c_29.exe, and it is infected with download.trojan.

Does anyone know if it's safe to delete this file? I did a Google search on it, but I had a hard time finding an answer.


Question by:kara334
    LVL 97

    Accepted Solution

    Greetings, kara334 !

    Yes, you can delete the file. It is not a Windows system file.  If you have difficulty deleting the file, Use Killbox or Unlocker in Safe Mode to remove the file.

    Killbox to remove stuborn files

    If you cannot delete the file, disable it.  Right click on the file and select Properties > Security > Advanced. Uncheck "Inherent from parent" and remove other permissions.  If you are using Windows XP Home, you need to access the Security tab from Safe Mode. If using Windows XP Pro and security tab is not available, go to any folder and select Tools > Folder Options > View. Uncheck "Use simple file sharing".

    Best wishes!
    LVL 97

    Expert Comment


    You can also try to delete the file in DOS.  If the file is in System Restore folder, then disable and re-enable system restore
    LVL 47

    Expert Comment

    Yes, you should remove it, that file is part of Trojan.banker
    You also can download removal also:

    CCleaner or Ewido should also remove it.
    Using Killbox "Delete On Reboot" Option should do it too.

    Author Comment


    The file was easy to delete once I located it. Funny, though, the name of the file was just slightly different from the one listed in the Norton scan. But it was the only file with a name of that type, and it was an executable. It was just sitting in a Temp. Int. Files folder.

    I told my client to run another Norton scan to make sure this was indeed the infected file. If she contacts me saying the file Norton found was still in there, I may have more questions. But for now hopefully everything is OK. Thank you for your help.

    LVL 97

    Expert Comment

    You are welcome, Kara!

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Join & Write a Comment

    In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now